Verification
1,986 Followers
Recent papers in Verification
More than 50% of software development effort is spent in testing phase in a typical software development project. Test case design as well as execution consume a lot of time. Hence, automated generation of test cases is highly required.... more
OO Big O 80 Joan Krone (Denison University) and W. F. Ogden (The Ohio State University) Ontology-based Description and Reasoning for Component-based Development on the Web 84 Claus Pahl (Dublin City University) Modeling Multiple Aspects... more
With the extensive use of agent-based modeling and simulation, there are many agent-based platforms available. The objective of this paper is to compare 3 agent-based platforms: NetLogo, Repast, and Cormas based on the results of the... more
La desinformación y las noticias falsas constituyen un fenómeno inherente a la comunicación. Con todo, a lo largo de los últimos años hemos asistido a la explosión de términos como “desinformación” o “fake news”, presentes en el día a día... more
— A palm print refers to an image acquired of the palm region of the hand. Palm print image enhancement is required for better feature extraction. To extract fine features enhancement is required. Fine features increase the accuracy of... more
The paper presents to address this challenge, we have proposed the use of Adaptive Window Positioning technique which focuses on not just the meaning of the handwritten signature but also on the individuality of the writer. This... more
Vehicle registration and licensing systems have been in existence for decades. However, there has been over 55% increase in the number of reported stolen vehicles which have not been recovered in the last 3 years. Therefore, there is need... more
How do philosophical accusations of talking nonsense relate to the layperson’s notions of meaning and meaningfulness? If one were to explain carefully what philosophical nonsense was supposed to be, would one be greeted with... more
Formal methods can be used at any stage of product development process to improve the software quality and efficiency using mathematical models for analysis and verification. From last decade, researchers and practitioners are trying to... more
Biometrics-based authentication is a potential alternative to password-based authentication. Of all biometric methods, face-based identification is one of the most convenient one. In ATM systems, facial images are captured using a high... more
An accurate biometric identification system is a critical requirement in a variety of applications. Iris-based identification has been receiving a lot of attention since its introduction. However, some techniques have limitations in... more
The Internet of Things (IoT) framework paves the way for a society in which many of the everyday items are integrated and communicate with the surroundings to gather information and simplify some activities. Modern computers become... more
Business process modeling is an increasingly popular method for improving organizational efficiency and quality. The ability to automatically validate the process model became a significant feature of modeling tools with the increasing... more
The main objectives of this work are to describe the online bus pass generation and ticket booking using QR code. Online bus pass generation is helpful to people who are suffering issues with the present technique for the generation of... more
There are several issues should be addressed and taken into consideration prior to initiating the e-voting system. The proposed system in this paper will ensure the integrity and the transparency of the electoral process. The paper will... more